Top 10 spyware tricks of 2005



You can tell we’re in the last 10-12 days of the year when we start seeing all sorts of year end retrospectives, year’s in review, countdowns of the top ___ of ___year ending___. Well, spyware has seen a banner year in many respects and Suzi at Spyware Confidential has a rundown of the top 10 tricks used in 2005.


Here’s a brief highlight…

10. Spyware spread through Windows Media files
9. Adware companies hide their dirty work using rootkit technology
8. Internet Explorer infected through Firefox
7. Direct Revenue unleashed Aurora
6. Spam bots, keyloggers, kiddie porn connect with major adware companies
5. Spazbox domain installs massive spyware/adware – using IRC
4. Anti-spyware spread by spyware and trojans
3. Direct Revenue adware distributed through BitTorrent
2. AIM worm carries backdoor, rootkit and adware, found to be powered by world wide bot net with ties to the Middle East.
1. Sony BMG infects users with DRM rootkit

What’s distressing is that I’m sure we haven’t seen the last of these tricks… In fact given the traction that some of the rogues have made with #4 above… that may be a favored vector this coming year. I’m sure that we’ll also see other, new tactics.

Earlier this afternoon I did some work for someone that had just recently got a new DSL connection. (And Symantec Internet Security 2006). She had got tons of messenger popup spam. (LAN connection was firewalled, but the PPPoE wasn’t..(?)) Anyway, she was confused about why Symantec would be popping up asking her to download win-fix for $49… So even some of the old vectors are still common. Fortunately she didn’t bite… (and now everything is firewalled and several services are disabled.

Related Posts

Blog Traffic Exchange Related Posts
  • Update on the Internet Explorer VML vulnerability Just catching up on the days VML vulnerability news from today.... It looks as though... the exploit is now MUCH more widespread this blog has some video of an infection, what's notable is that the first take was VERY UNEVENTFUL, it was used to stealthily install a keylogger. (So that......
  • Huge identity theft ring discovered by spyware research Sunbelt blog, reports that they have uncovered a MASSIVE amount of personal data, ranging from usernames to passwords to banking information and much more while investigating spyware. They found keylogger transcript software with lots of personal information. Sunbelt develops software to protect against spam and spyware and other security threats.......
  • The Vista stories keep coming - Vista bad news for small security companies VuNet has an article today on the coming of Vista and the imminent doom of the smaller security companies. The hardest hit will be anti-spyware and personal firewall vendors they say. It may well be true, it does sound like a different approach to user permissions (limited priviliges by default?)......
Blog Traffic Exchange Related Websites
  • Biblical Contradiction: Good works should be seen or hidden: Biblical Contradiction Explained: Good works should be seen or hidden: Good works should be hidden: “Beware of practicing your righteousness before men to be noticed by them; otherwise you have no reward with your Father who is in heaven. Matthew 6:1 Good works should be seen: Let your light shine......
  • My Life as a Volunteer Tax Preparer - Ch 2.3 Yesterday's session at the Tax Aide volunteer office was more quiet than most. I worked on three returns. One was a return that I started last week. The other two clients were unique and interesting, with one being upbeat and the other a real head-shaker. My first taxpayer was a......
  • Planning For Retirement Late in Life Not all of us have had the luxury of spending the last 20 years to secure our financial future. Most of the time, through no fault of our own, putting aside money for retirement takes a back seat to handling emergencies or schooling for our kids, or simply the daily......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site